Sha256: e466dc99c7632c2c4535daa3827c2d8937cd9fc01b4ca48239a57bedd676bd29

Contents?: true

Size: 1.35 KB

Versions: 6

Compression:

Stored size: 1.35 KB

Contents

module Doorkeeper
  class TokensController < Doorkeeper::ApplicationMetalController
    def create
      response = strategy.authorize
      self.headers.merge! response.headers
      self.response_body = response.body.to_json
      self.status        = response.status
    rescue Errors::DoorkeeperError => e
      handle_token_exception e
    end

    # OAuth 2.0 Token Revocation - http://tools.ietf.org/html/rfc7009
    def revoke
      # The authorization server first validates the client credentials
      if doorkeeper_token && doorkeeper_token.accessible?
        # Doorkeeper does not use the token_type_hint logic described in the RFC 7009
        # due to the refresh token implementation that is a field in the access token model.
        revoke_token(request.POST['token']) if request.POST['token']
      end
      # The authorization server responds with HTTP status code 200 if the
      # token has been revoked successfully or if the client submitted an invalid token
      render json: {}, status: 200
    end

    private

    def revoke_token(token)
      token = AccessToken.by_token(token) || AccessToken.by_refresh_token(token)
      if token && doorkeeper_token.same_credential?(token)
        token.revoke
        true
      else
        false
      end
    end

    def strategy
      @strategy ||= server.token_request params[:grant_type]
    end
  end
end

Version data entries

6 entries across 6 versions & 1 rubygems

Version Path
doorkeeper-2.1.0 app/controllers/doorkeeper/tokens_controller.rb
doorkeeper-2.0.1 app/controllers/doorkeeper/tokens_controller.rb
doorkeeper-2.0.0 app/controllers/doorkeeper/tokens_controller.rb
doorkeeper-2.0.0.rc3 app/controllers/doorkeeper/tokens_controller.rb
doorkeeper-2.0.0.rc2 app/controllers/doorkeeper/tokens_controller.rb
doorkeeper-2.0.0.alpha1 app/controllers/doorkeeper/tokens_controller.rb